amass
Attack surface mapping and asset discovery
TLDR
Enumerate subdomains passively
SYNOPSIS
amass command [options]
DESCRIPTION
amass is an OWASP project for in-depth attack surface mapping and asset discovery. It performs DNS enumeration, subdomain brute-forcing, and leverages numerous data sources including search engines, certificate transparency logs, and APIs.
The tool builds a comprehensive map of an organization's external network footprint, identifying subdomains, related domains, and network blocks.
PARAMETERS
enum
Perform enumeration and network mappingintel
Collect intelligence on target organizationtrack
Track changes to discovered infrastructuredb
Manage the graph databaseviz
Visualize collected data-d domain
Target domain-passive
Only use passive data sources (no DNS queries)-active
Use active methods including DNS brute-forcing-ip
Show IP addresses of discovered names-src
Show source of each discovered name-brute
Enable subdomain brute-forcing-o file
Output file path-dir path
Directory for output files-config file
Configuration file
CONFIGURATION
~/.config/amass/config.ini
Main configuration file for data sources, API keys, and enumeration settings.
CAVEATS
Active enumeration generates significant DNS traffic and may be detected. Many data sources require API keys for full access. Results vary based on configured sources.
HISTORY
amass was created by Jeff Foley and became an official OWASP project. It gained widespread adoption in the security community for reconnaissance and bug bounty hunting.
